Value Proposition

Working together, the integrated solution provide by Palo Alto Networks and Aruba Networks maps user and device information to network security policies, enabling IT to govern what a user can access with a particular device and authorized application. 

 

Why Aruba?

Palo Alto Networks and Aruba Networks have been working together to deliver upon a concept that we call Adaptive Trust. Instead of recreating the past mistakes and outdated assumptions in security, we sought to build a solution built upon 3 concepts. 

  1. You need to identify users – from the very point they’re on the network, you need to know who they are. That’s why identity is important, and it’s core to what Aruba does to secure the access layer.
  2. You have to have context such as knowing who the users is and what the device is in order to understand what they should be allowed to access. In other words, context is important and should be coordinated and preserved to enforce granular policy
  3. You need protection, to make sure that out of the applications that you do permit, you make the traffic safe.

Bringing together the technology from Aruba Networks and Palo Alto Networks together, we deliver upon this very concept for adaptive trust.

PARTNER TOPICS

Tech Brief

White Paper

Solution Brief

Customer Case Study

Solution Overview

 


For more information or question about this partnership, please contact strategicpartners@paloaltonetworks.com.


 

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

  • 62
  • 181564

2018 Predictions & Recommendations: Automated Threat Response Technology in OT Grows Up

Automated threat response, which we’ll simply refer to as ATR, is the process of automating the action taken on detected cyber incidents, particularly those deemed malicious or anomalous. For each type of incident, there is a predefined action for containment or prevention where newer technologies, such as behavioral analytics and artificial intelligence, are utilized to bring incidents of interest to the surface.

  • 2
  • 25546

What is an Intrusion Prevention System?

An Intrusion Prevention System (IPS) is a network security prevention technology that examines network traffic flow to detect and prevent vulnerability exploits

  • 0
  • 56054

PA-5200 Series Datasheet

Key features, performance capacities and specifications for our PA-5200 Series.

  • 5
  • 50323

PA-800 Series Datasheet

Palo Alto Networks PA-800 Series next-generation firewall appliances are designed to secure enterprise branch offices and midsized businesses.

  • 8
  • 52403

What is Cybersecurity?

Cybersecurity refers to the preventative techniques used to protect the integrity of networks, programs and data from attack, damage, or unauthorized access.

  • 0
  • 36107